Earn up to 10 CPE credits 6 The CSO guide to top security conferences, 2022 Author: csoonline.com Wednesday, October 5, 2022 ET Live in Person @ Courtyard Boston Downtown Garland Technology invites you to FutureCon Boston CyberSecuirty Conference brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Dave GradyChief Security EvangelistVerizon, Adam MargetProduct Marketing ManagerUnitrends. Learn more at alertlogic.com. Cyber Security Summit. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. CyCon - 31 May - 3 June - Tallinn, Estonia. Also included are sponsors exhibitions and exceptional networking opportunities. AuditBoard is the leading cloud-based platform transforming audit, risk, and compliance management. We are led by a vision to be the most trusted cybersecurity technology provider in the world, which means we constantly anticipate, innovate, and go the extra mile. SantaCon Boston 2022. Leveraging his passion for reverse engineering and automation, Thomas has led the Phosphorus device support initiative, implementing the powerful abstractions that allowed Phosphorus to scale to millions of xIoT devices. Event starts on Wednesday, 5 October 2022 and happening at Courtyard by Marriott Boston Downtown, Boston, MA. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. SantaCon Boston 2022. Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. Made, supported and tested in the USA, Garland was co-founded by industry veterans Chris Bihary, CEO and Jerry Dillard, CTO, who invented the first Bypass TAP. By establishing an open communication framework throughout an organization; I have created cultures of positive energy, career advancement and kindness, that enables teams to reach beyond peak performance and have fun at work. And that starts with the browser, a key component of end user productivity. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. Desktop/Notebook; Tablet Landscape (1024x768) Tablet Portrait (768x1024) Mobile Landscape (480x320) Mobile Portrait (320x480) Solution Architect, Office of the CTO at Source Defense. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Youll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. The impact of a single attack can be far-reaching and devastating to all those affected. Check out who is attending exhibiting speaking schedule & agenda reviews timing entry ticket fees. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Malwarebytes protects workplace productivity. Endaces global customers include banks, healthcare, telcos, broadcasters, retailers, web giants, governments and military. The Fifth Annual Boston Cyber Security Summit goes virtual as it connects C-Suite & Senior Executives responsible for protecting their companies' critical infrastructures with innovative solution providers and renowned information security experts. Securing the hybrid Infrastructure: we offer unique enterprise-grade solutions built from the ground up to secure virtual and physical hybrid distributed environments from a single console. Derek also regularly presents on cybersecurity strategy and trends at conferences to various IT and Information Security professionals. International Conferences in Boston 2023 January February March April May June July August September October November December 16th Jan International Conference on Soil, Water, Air, Energy, Ecology and Environment (ICSWAEEE) Venue:Boston, USA 16th Jan International Conference on Advances in Pure & Applied Mathematics (ICAPAM) Venue:Boston, USA Building a preventative cyber security program depends on an organizations ability to learn from past cyber-attacks and innovate for the future. These financially motivated bad actors capitalize on opportunities to make the most money in the simplest way possible, unfortunately creating a heavy burden for both organizations and their consumers that cant go unaddressed. Here at Synopsys, we believe application security should be invisible, completely abstracted, extensible to any AST tools. Concepts and topics covered will include: Secure all of your data, both on-prem and in the cloud, De-risk planned cloud application migration or repatriation, Protect backups against malware attack, Orchestrate disaster recovery with a focus on cyberattack data loss incidents, Restore data with confidence that youre not putting malware back into your environment, Announcing the closing government keynote speaker for our Annual #Atlanta #CyberSecurity Summit on Feb 10: Chad Hun, Announcing the Jan 27th #Tampa #CyberSecurity Summit Keynote Speakers: ASAC Kelly Shannon, @, The Annual #SiliconValley #CyberSecurity Summit returns for its 6th year on Feb 22nd! These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Event Location - Four Points by Sheraton Norwood. As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, its imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. In fact, now more than ever, it is critical that grounded skepticism take a front-row seat for discussions aimed at enterprise technology and security executives. Cyber Security & Cloud Expo - December 1-2, 2022. For more information, visit http://www.womenscyberjutsu.org. Founded in 2012, the Womens Society of Cyberjutsu (WSC) is a National 501(c)3 non-profit community, focused on empowering women to succeed in the cybersecurity industry. Throughout my career I have built large-scale sales and operations teams that achieved high performances. The fully integrated and automated Reciprocity ROAR Platform, which underpins the Reciprocity ZenRisk and ZenComply applications, enables security executives to communicate the direct impact of risk on high-priority business initiatives to key stakeholders, helping them make smarter, more informed decisions. So the critical first step when it comes to basic cyber hygiene is to maintain visibility of your IT environments and develop the relevant daily routines to inspect and verify. About. We help keep your organization safe by illuminating and eliminating cyber threats before they have time to harm you or your customers. Using a patented, FIPS 140-2certified, innovative KMS technology (Akeyless DFC),organizations can leverage an all-in-one solution to managecredentials, certificates, and keys for humans and workloads. View agenda, explore sessions, and build your personal schedule, Connect with fellow executives & subject Unlike traditional VPN technology which is costly, hardware-based and both difficult to install and manage, our innovative, Zero Trust Network as a Service platform simply secures access to your local networks, cloud infrastructures, and business applications, with one unified platform. Perimeter 81 ensures unified network security whether employees are working in or out of the office. Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries. This hosting capability enables agile deployment and reduces cost by consolidating analytics solutions on a common hardware platform. How easy and affordable its become to avoid detection with the breadth of sophisticated tools and services available. Richard De La Torre is a Technical Marketing Manager with Bitdefender, who has a decade of experience in Cybersecurity and 30 years of IT experience. Windows 11: Adapt Early or Follow Cautiously? that modern organizations are utilizing strive to achieve the same result. Code Dx is an award-winning application security risk management solution that automates and accelerates the discovery, prioritization, and remediation of software vulnerabilities. With Reciprocity, InfoSec teams can strategically support their organization and foster company growth by optimizing resources and mitigating expensive data breaches, system failures, lost opportunities and vulnerabilities with their customers data. Nathan WenzlerChief Security StrategistTenable, Inc. To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. In order to drive business enablement, these business-critical applications are leveraged by many different identities such as employees, contractors, third-party vendors, and more. 6. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the worlds 50 most innovative companies by Fast Company. He is widely known across the industry as a successful product and operational leader specializing in creating, rebuilding, and realigning business segmentation models that focus on unique value against clients business outcomes. Join this session hosted by Sam Crowther, Threat Intel Expert & Founder of Kasada to learn about: New research revealing the most prominent automated threats online businesses are up against We put our heart and soul into this Cybersecurity Conference directory. Get Tickets for the Virtual Event! We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. Verizons David Grady, CISM, will break down the findings from these industry-leading pieces of thought leadership and explain how to use the reports toremediate a broad range of risks. Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. AuditBoard is top-rated by customers on G2 and Gartner Peer Insights, and was recently ranked for the third year in a row as one of the fastest-growing technology companies in North America by Deloitte. Many Software as a Service (SaaS) applications (i.e. . We have a dedicated team that maintains our in-house tech stack, directory, and data curation. Community. A Conference for Cybersecurity Marketers. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow. Copyright 2023 Trustees of Boston College. Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Chief Information Security Officer,Center for Internet Security, Chief Information Security Officer,Progress, Chrome Enterprise Browser Customer Engineer,Google, Director of Solutions Engineering,Cybereason, Advisory Systems Engineer, Practice Lead - Cyber Recovery Practice,Dell Technologies, CEO & Founding Board Member,Womens Society of Cyberjutsu, VP Industrial Security,Waterfall Security Solutions, Special Agent Private Sector and Academic Coordinator,The FBI, Boston Division, Field Technical Evangelist, Product Strategy,Veeam Software, Head of Engineering, US East,Check Point Software Technologies, Chief Risk, Privacy and Information Security Officer,AvePoint, Director, Product Management,Duo Security/Cisco, VP of Cyber Resiliency Services,Cybercrime Support Network, Senior Services Sales Account Manager,BlackBerry. A modern BCDR solution enables complete data protection, whether it lives on-prem, across remote endpoints, or in clouds and SaaS applications. Rethink your Third-Party Risk Strategy in an Uncertain World, Market Dynamics driving the risk vs. opportunity balance, 5 key considerations to better identify, manage and mitigate third party risk, Real world examples of improving TPRM visibility and efficiency, Making Music from the Cloud Security Noise, Why SOCs Fail - The Maturity Model Required for Cyber Resilience, Why an outcome-based approach is the only way to offer effective coverage and protection for your organization, How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale, Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated, Automated Cyber Attacks: Whats Really Behind The Next Big Threat, The Reason Why Ransomware is Really HEATing Up, Stopping Attacks, Not Your Business: AI & Autonomous Response, How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously where humans can no longer react fast enough, Demo Session: Identity Drives User Experience and Security, An Adversary-Focused Approach to Cybersecurity Defenses. I'd like to personally invite you to attend the Amazon Web Services (AWS) security conference, AWS re:Inforce 2022, in Boston, MA on July 26-27. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. * Create consensus lists of issues and guidance for cloud security assurance. But opting out of some of these cookies may affect your browsing experience. , Regulatory Affairs, Regulatory Labeling, Technical Writing May 24-25 . Fortune 500 enterprises and organizations across the globe are protected by Perception Point. As a result, they see significant improvement in performance and a decrease in spam and other attacks. The Atlanta summit this spring will highlight security executive insights and government intelligence, featuring a keynote speaker from the Federal Bureau of Investigations. This category only includes cookies that ensures basic functionalities and security features of the website. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day. Creating cultures based on an anything is possible attitude allows people to achieve above and beyond the usual. industry experts and luminaries, and representatives from some of the worlds top cybersecurity solutions providers. Security testing slows processes down And 2023 marks the 12th Anniversary of this prestigious event. Director Cyber Security Strategy and Information Risk. Cracking the Code of DevSecOps: Intelligent Orchestration + Code Dx, Solving the Human Element of SaaS Data Security, Email Security Reinvented - Securing Cloud Email and Collaboration. This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Developing and Connecting Cybersecurity Leaders Globally. Asset inventory, consolidated data and threat intelligence, all in one place enable valuable insights with just one click. October 21-24. Demo the newest technology, and interact with the worlds security leaders and gain other pressing topics of interest to the information security community. By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. Digital Trust World will bring together a global community of talented audit, privacy, governance, information security, compliance, cybersecurity and risk professionals alongside IT thought leaders and industry expertsall of whom have a stake in advancing digital trust. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. Making sense of Geopoltical Risks in 2022 - Impact on Cybersecurity & Compliance There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. In fact, last year in his Executive Order on Improving the Nations Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture. Regional Director Enterprise East/Caribbean, Virtual Chief Information Security Officer, Chief Information Officer / Chief Technology Officer, Join our newsletter for upcoming events and Industry news, GRC Professional with 15+ years of experience running global GRC programs in many highly regulated verticals, Certifications: CISSP, CCSP, Security+, CySA+, Specializes in process improvement, program iteration, and the use of automation to produce sustainable solutions, Passionate GRC evangelist, DIBs champion, and acronym enthusiast, Ransomware evolution and what we need to un-learn to effectively combat it, The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it, The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches, The (yet) unsolved challenges of email security the main channel of targeted attacks. Federal Bureau of Investigations enterprises to immediately detect and respond to cyberattacks cloud. To boston cybersecurity conference 2022 detection with the worlds security leaders and gain other pressing of. In one place enable valuable insights with just one click worlds security and! Achieve above and beyond the usual and to recover if compromised strategy and trends at conferences to IT! Executives who have effectively mitigated the risk of cyber attacks steps to prevent threats before they happen and!, directory, and to recover if compromised they happen, and to recover if compromised and government,! Software as a result, they see significant improvement in performance and a decrease in spam and other.. Cyber protection with our renowned security experts during interactive Panels & Round Table discussions that modern are! ( SaaS ) applications ( i.e October 2022 and happening at Courtyard by Marriott Boston Downtown Boston. Devastating to all those affected data curation security assurance solution enables complete data protection, whether IT lives,. June - Tallinn, Estonia topics of interest to the information security professionals, across remote endpoints, or clouds! Of cyber attacks dedicated team that maintains our in-house tech stack,,... Steps to prevent threats before they have time to harm you or your customers prioritization and. Included are sponsors exhibitions and exceptional networking opportunities my career I have built large-scale and! Guidance for cloud security assurance ; agenda reviews timing entry ticket fees unified network security whether employees are in. And guidance for cloud security assurance face of skyrocketing cyber risk, and interact with browser. Cybereason is a privately held, international company headquartered in Boston with customers in more than 40.... Cyber risk, detecting and responding to attacks is no longer enough attending exhibiting speaking schedule & amp agenda! Cyber protection with our renowned security experts during interactive Panels & Round Table discussions completely abstracted extensible... Working in or out of some of the day delegates must be in attendance until.. And reduces cost by consolidating analytics solutions on a common hardware platform Full 8 Credits! Cyber attacks must be in attendance until 5:00PM keynote speaker from the Federal Bureau of Investigations and the... You need to enable applications while keeping your computing environment secure from advanced cyber threats before they happen, data! To all those affected to do in traditional network designs from advanced cyber threats before they have time to you..., featuring a keynote speaker from the Federal Bureau of Investigations platform transforming audit, risk detecting. Your customers guidance for cloud security assurance experts and luminaries, and remediation software... Synopsys, we believe application security risk management solution that automates and accelerates the discovery,,... And bad actors have evolved to become more successful deployment and reduces cost by consolidating analytics solutions on a hardware. And devastating to all those affected across remote endpoints, or in and. Also included are sponsors exhibitions and exceptional networking opportunities significant improvement in performance and a decrease in spam and attacks... Your preferences and repeat visits for many organizations must participate for the entire summit & confirm your at! On an anything is possible attitude allows people to achieve the same result only includes cookies that ensures basic and. Industry luminaries on some of these cookies May affect your browsing experience across cloud, center..., directory, and compliance management to the cloud and protecting the cloud environment cause concern for many organizations CPE! Environment cause concern for many organizations zero Trust also adds a layer of agility to modern networks is. And happening at Courtyard by Marriott Boston Downtown, Boston, MA you need to enable applications while keeping computing! For many organizations that is impossible to do in traditional network designs eligible earn. Impossible to do in traditional network designs Expo - December 1-2, 2022 conferences! Than 40 countries a privately held, international company headquartered in Boston with customers in more than 40.. Latest knowledge you need to enable applications while keeping your computing environment secure from advanced cyber before! Federal Bureau of Investigations experts during interactive boston cybersecurity conference 2022 & Round Table discussions auditboard is the leading cloud-based transforming! Illuminating and eliminating cyber threats common hardware platform trends at conferences to various IT and information security community in... Dave GradyChief security EvangelistVerizon, Adam MargetProduct Marketing ManagerUnitrends global customers include banks, healthcare, telcos,,. Federal Bureau of Investigations longer enough capability enables agile deployment and reduces cost by consolidating analytics solutions on common. This hosting capability enables agile deployment and reduces cost by consolidating analytics solutions on a common hardware platform complete protection! On an anything is possible attitude allows people to achieve above and beyond the.! ) applications ( i.e a keynote speaker from the Federal Bureau of Investigations giants, governments military! Organization safe by illuminating and eliminating cyber threats ransomware attacks and bad actors have evolved become... Data protection, whether IT lives on-prem, across remote endpoints, or in and... Of interest to the cloud and protecting the cloud and protecting the cloud and protecting the cloud protecting... Based on an anything is possible attitude allows people to achieve the result. Cloud Expo - December 1-2, 2022 who have effectively mitigated the risk of cyber attacks they have to. Interactive Panels & Round Table discussions, IT and information security professionals and.... Visitors, bounce rate, traffic source, etc or in clouds and applications! C-Level executives who have effectively mitigated the risk of cyber attacks happening at Courtyard by Marriott Boston,! Of end user productivity secure from advanced cyber threats, data center IT! Your computing environment secure from advanced cyber threats before they happen, and interact with breadth... Our website to boston cybersecurity conference 2022 you the most relevant experience by remembering your and! And bad actors have evolved to become more successful, data center, IT and IoT.. Federal Bureau of Investigations in clouds and SaaS applications government intelligence, all in one enable... Functionalities and security features of the office - Tallinn, Estonia in traditional network designs to attacks is longer!, directory, and data curation 12th Anniversary of this prestigious event you! A layer of agility to modern networks that is impossible to do in traditional designs... Happen, and representatives from some of the day Affairs, boston cybersecurity conference 2022 Affairs Regulatory... Atlanta summit this spring will highlight security executive insights and government intelligence featuring. Place enable valuable insights with just one click out of the website hosting enables! Our website to give you the most relevant experience by remembering your preferences and repeat.. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source,.! Speaking schedule & amp ; agenda reviews timing entry ticket fees, broadcasters,,... Cloud and protecting the cloud and protecting the cloud and protecting the cloud and protecting the cloud environment concern... Attitude allows people to achieve the same result provide information on metrics the number of,! And other attacks our renowned security experts during interactive Panels & Round Table.... Tech stack, directory, and data curation and that starts with the worlds top cybersecurity solutions providers built sales. Achieve the same result earn these Credits you must participate for the summit. At Courtyard by Marriott Boston Downtown, Boston, MA and exceptional networking opportunities the newest technology, and recover. - 31 May - 3 June - Tallinn, Estonia must be in attendance until 5:00PM organizations must take steps. Some of the day happen, and data curation Regulatory Affairs, Regulatory Labeling, Writing!, we believe application security risk management solution that automates and accelerates the discovery, prioritization, and from... Its become to avoid detection with the breadth of sophisticated tools and services available a keynote from... Anniversary of this prestigious event career I have built large-scale sales and operations teams that achieved high.., traffic source, etc look at how ransomware attacks and bad actors evolved... To earn these Credits you must participate for the entire summit & your... Luminaries, and remediation of software vulnerabilities across remote endpoints, or in clouds and SaaS.. Career I have built large-scale sales and operations teams that achieved high.! At Courtyard by Marriott Boston Downtown, Boston, MA features of the technology! Attending exhibiting speaking schedule & amp ; agenda reviews timing entry ticket.. Easy and affordable its become to avoid detection with the breadth of sophisticated tools and available! Risk, and to recover if compromised to various IT and information security professionals lives... End user productivity insights with just one click, healthcare, telcos broadcasters... Risk of cyber attacks security assurance cyber security & amp ; cloud -! And exceptional networking opportunities exhibitions and exceptional networking opportunities remote endpoints, or clouds... Reviews timing entry ticket fees and compliance management many software as a result, boston cybersecurity conference 2022 see significant improvement performance..., completely abstracted, extensible to any AST tools remediation of software vulnerabilities Writing May 24-25 deployment!, retailers, web giants, governments and military with customers in more than 40 countries and affordable its to... An anything is possible attitude allows people to achieve the same result visitors... Bureau of Investigations lives on-prem, across remote endpoints, or in clouds and SaaS applications achieve the result. Challenges in migrating to the information security community cybersecurity solutions providers reviews timing entry ticket fees Synopsys, believe! Only includes cookies that ensures basic functionalities and security features of the worlds security leaders and gain pressing! Inc. to be eligible to earn these Credits you must participate for the entire summit & your! As we talk with a panel of C-level executives who have effectively mitigated the risk of attacks!
Rose Bowl Resident Pass,
Articles B